| line | stmt | bran | cond | sub | pod | time | code | 
| 1 |  |  |  |  |  |  | package App::RecordStream::Operation::fromtcpdump; | 
| 2 |  |  |  |  |  |  |  | 
| 3 |  |  |  |  |  |  | our $VERSION = "4.0.25"; | 
| 4 |  |  |  |  |  |  |  | 
| 5 | 1 |  |  | 1 |  | 386 | use strict; | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 20 |  | 
| 6 | 1 |  |  | 1 |  | 4 | use warnings; | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 19 |  | 
| 7 |  |  |  |  |  |  |  | 
| 8 | 1 |  |  | 1 |  | 4 | use base qw(App::RecordStream::Operation); | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 65 |  | 
| 9 |  |  |  |  |  |  |  | 
| 10 | 1 |  |  | 1 |  | 5 | use App::RecordStream::OptionalRequire qw(NetPacket::Ethernet :ALL); | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 4 |  | 
| 11 | 1 |  |  | 1 |  | 4 | use App::RecordStream::OptionalRequire qw(NetPacket::IP :ALL); | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 3 |  | 
| 12 | 1 |  |  | 1 |  | 3 | use App::RecordStream::OptionalRequire qw(NetPacket::TCP :ALL); | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 3 |  | 
| 13 | 1 |  |  | 1 |  | 3 | use App::RecordStream::OptionalRequire qw(NetPacket::UDP :ALL); | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 3 |  | 
| 14 | 1 |  |  | 1 |  | 3 | use App::RecordStream::OptionalRequire qw(NetPacket::ARP :ALL); | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 2 |  | 
| 15 | 1 |  |  | 1 |  | 5 | use App::RecordStream::OptionalRequire qw(Net::Pcap pcap_open_offline pcap_loop pcap_next_ex); | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 3 |  | 
| 16 | 1 |  |  | 1 |  | 4 | use App::RecordStream::OptionalRequire qw(Net::DNS::Packet); | 
|  | 1 |  |  |  |  | 1 |  | 
|  | 1 |  |  |  |  | 3 |  | 
| 17 |  |  |  |  |  |  | App::RecordStream::OptionalRequire::require_done(); | 
| 18 |  |  |  |  |  |  |  | 
| 19 | 1 |  |  | 1 |  | 3 | use Data::Dumper; | 
|  | 1 |  |  |  |  | 2 |  | 
|  | 1 |  |  |  |  | 861 |  | 
| 20 |  |  |  |  |  |  |  | 
| 21 |  |  |  |  |  |  | # From NetPacket::IP | 
| 22 |  |  |  |  |  |  | my $IP_FLAGS = { | 
| 23 |  |  |  |  |  |  | 'more_fragments' => IP_FLAG_MOREFRAGS, | 
| 24 |  |  |  |  |  |  | 'dont_fragment'  => IP_FLAG_DONTFRAG, | 
| 25 |  |  |  |  |  |  | 'congestion'     => IP_FLAG_CONGESTION, | 
| 26 |  |  |  |  |  |  | }; | 
| 27 |  |  |  |  |  |  |  | 
| 28 |  |  |  |  |  |  | # From NetPacket::TCP | 
| 29 |  |  |  |  |  |  | my $TCP_FLAGS = { | 
| 30 |  |  |  |  |  |  | FIN => FIN, | 
| 31 |  |  |  |  |  |  | SYN => SYN, | 
| 32 |  |  |  |  |  |  | RST => RST, | 
| 33 |  |  |  |  |  |  | PSH => PSH, | 
| 34 |  |  |  |  |  |  | ACK => ACK, | 
| 35 |  |  |  |  |  |  | URG => URG, | 
| 36 |  |  |  |  |  |  | ECE => ECE, | 
| 37 |  |  |  |  |  |  | CWR => CWR, | 
| 38 |  |  |  |  |  |  | }; | 
| 39 |  |  |  |  |  |  |  | 
| 40 |  |  |  |  |  |  | # From NetPacket::ARP_OPCODES | 
| 41 |  |  |  |  |  |  | my $ARP_OPCODES = { | 
| 42 |  |  |  |  |  |  | +ARP_OPCODE_REQUEST  , 'ARP_REQUEST', | 
| 43 |  |  |  |  |  |  | +ARP_OPCODE_REPLY    , 'ARP_REPLY', | 
| 44 |  |  |  |  |  |  | +RARP_OPCODE_REQUEST , 'RARP_REQUEST', | 
| 45 |  |  |  |  |  |  | +RARP_OPCODE_REPLY   , 'RARP_REPLY', | 
| 46 |  |  |  |  |  |  | }; | 
| 47 |  |  |  |  |  |  |  | 
| 48 |  |  |  |  |  |  | my $DEFAULT_SUPPRESSED_FIELDS = [qw(data _frame _parent type)]; | 
| 49 |  |  |  |  |  |  |  | 
| 50 |  |  |  |  |  |  | sub init { | 
| 51 | 0 |  |  | 0 |  |  | my $this = shift; | 
| 52 | 0 |  |  |  |  |  | my $args = shift; | 
| 53 |  |  |  |  |  |  |  | 
| 54 | 0 |  |  |  |  |  | my $data = 0; | 
| 55 | 0 |  |  |  |  |  | my $spec = { | 
| 56 |  |  |  |  |  |  | 'data' => \$data, | 
| 57 |  |  |  |  |  |  | }; | 
| 58 |  |  |  |  |  |  |  | 
| 59 | 0 |  |  |  |  |  | $this->parse_options($args, $spec); | 
| 60 |  |  |  |  |  |  |  | 
| 61 | 0 | 0 |  |  |  |  | if ( ! @$args ) { | 
| 62 | 0 |  |  |  |  |  | die "Missing capture file\n"; | 
| 63 |  |  |  |  |  |  | } | 
| 64 |  |  |  |  |  |  |  | 
| 65 | 0 |  |  |  |  |  | $this->{'FILES'} = $args; | 
| 66 | 0 |  |  |  |  |  | $this->{'DATA'}  = $data; | 
| 67 |  |  |  |  |  |  | } | 
| 68 |  |  |  |  |  |  |  | 
| 69 |  |  |  |  |  |  | sub wants_input { | 
| 70 | 0 |  |  | 0 |  |  | return 0; | 
| 71 |  |  |  |  |  |  | } | 
| 72 |  |  |  |  |  |  |  | 
| 73 |  |  |  |  |  |  | sub stream_done { | 
| 74 | 0 |  |  | 0 |  |  | my $this = shift; | 
| 75 |  |  |  |  |  |  |  | 
| 76 | 0 |  |  |  |  |  | foreach my $filename ( @{$this->{'FILES'}} ) { | 
|  | 0 |  |  |  |  |  |  | 
| 77 | 0 |  |  |  |  |  | $this->update_current_filename($filename); | 
| 78 |  |  |  |  |  |  | # TODO: have a connections output rather than packets | 
| 79 | 0 |  |  |  |  |  | $this->dump_packets($filename); | 
| 80 |  |  |  |  |  |  | } | 
| 81 |  |  |  |  |  |  | } | 
| 82 |  |  |  |  |  |  |  | 
| 83 |  |  |  |  |  |  | sub dump_packets { | 
| 84 | 0 |  |  | 0 |  |  | my $this = shift; | 
| 85 | 0 |  |  |  |  |  | my $file = shift; | 
| 86 |  |  |  |  |  |  |  | 
| 87 | 0 |  |  |  |  |  | my $error; | 
| 88 | 0 |  |  |  |  |  | my $pcap = pcap_open_offline($file, \$error); | 
| 89 |  |  |  |  |  |  |  | 
| 90 | 0 | 0 |  |  |  |  | die $error if ( $error ); | 
| 91 |  |  |  |  |  |  |  | 
| 92 | 0 |  |  |  |  |  | my ($raw_packet, %header); | 
| 93 | 0 |  |  |  |  |  | while(pcap_next_ex($pcap, \%header, \$raw_packet) == 1) { | 
| 94 |  |  |  |  |  |  |  | 
| 95 |  |  |  |  |  |  | my $record = { | 
| 96 |  |  |  |  |  |  | 'length' => $header{'len'}, | 
| 97 | 0 |  |  |  |  |  | 'caplen' => $header{'caplen'}, | 
| 98 |  |  |  |  |  |  | 'file'   => $file, | 
| 99 |  |  |  |  |  |  | }; | 
| 100 |  |  |  |  |  |  |  | 
| 101 | 0 | 0 |  |  |  |  | if ( $header{'tv_sec'} ) { | 
| 102 | 0 |  |  |  |  |  | $record->{'timestamp'} = join('.', $header{'tv_sec'}, $header{'tv_usec'}); | 
| 103 |  |  |  |  |  |  | } | 
| 104 |  |  |  |  |  |  |  | 
| 105 | 0 |  |  |  |  |  | $this->push_record($this->create_packet_record($raw_packet, $record)); | 
| 106 |  |  |  |  |  |  | } | 
| 107 |  |  |  |  |  |  | } | 
| 108 |  |  |  |  |  |  |  | 
| 109 |  |  |  |  |  |  | # Packet parsing courtesy of Net::Analysis | 
| 110 |  |  |  |  |  |  | sub create_packet_record { | 
| 111 | 0 |  |  | 0 |  |  | my $this   = shift; | 
| 112 | 0 |  |  |  |  |  | my $packet = shift; | 
| 113 | 0 |  |  |  |  |  | my $record = shift; | 
| 114 |  |  |  |  |  |  |  | 
| 115 | 0 |  |  |  |  |  | my ($eth_obj) = NetPacket::Ethernet->decode($packet); | 
| 116 |  |  |  |  |  |  |  | 
| 117 | 0 |  |  |  |  |  | $this->propagate_fields('ethernet', $eth_obj, $record); | 
| 118 | 0 |  |  |  |  |  | my $type = 'ethernet'; | 
| 119 | 0 |  |  |  |  |  | my $data = $eth_obj->{'data'}; | 
| 120 |  |  |  |  |  |  |  | 
| 121 | 0 | 0 |  |  |  |  | if ($eth_obj->{type} == ETH_TYPE_IP) { | 
|  |  | 0 |  |  |  |  |  | 
| 122 | 0 |  |  |  |  |  | my $ip_obj = NetPacket::IP->decode($eth_obj->{data}); | 
| 123 | 0 |  |  |  |  |  | $this->propagate_fields('ip', $ip_obj, $record, [qw(flags)]); | 
| 124 | 0 |  |  |  |  |  | $type = 'ip'; | 
| 125 | 0 |  |  |  |  |  | $data = $ip_obj->{'data'}; | 
| 126 |  |  |  |  |  |  |  | 
| 127 |  |  |  |  |  |  | $record->{'ip'}->{'flags'} = $this->get_flag_list( | 
| 128 | 0 |  |  |  |  |  | $ip_obj->{'flags'}, | 
| 129 |  |  |  |  |  |  | $IP_FLAGS, | 
| 130 |  |  |  |  |  |  | ); | 
| 131 |  |  |  |  |  |  |  | 
| 132 | 0 | 0 |  |  |  |  | if($ip_obj->{proto} == IP_PROTO_TCP) { | 
|  |  | 0 |  |  |  |  |  | 
| 133 |  |  |  |  |  |  | # Some ethernet frames come with padding; this confuses NetPacket, | 
| 134 |  |  |  |  |  |  | #  so strip it off here before parsing the IP payload as a TCP | 
| 135 |  |  |  |  |  |  | #  packet. | 
| 136 | 0 |  |  |  |  |  | my $ip_data_len = $ip_obj->{len} - $ip_obj->{hlen} * 4; | 
| 137 | 0 | 0 |  |  |  |  | if ($ip_data_len < length($ip_obj->{data})) { | 
| 138 | 0 |  |  |  |  |  | my $truncated_data = substr($ip_obj->{'data'}, 0, $ip_data_len); | 
| 139 | 0 |  |  |  |  |  | $ip_obj->{'data'} = $truncated_data; | 
| 140 |  |  |  |  |  |  | } | 
| 141 |  |  |  |  |  |  |  | 
| 142 | 0 |  |  |  |  |  | my $tcp_obj = NetPacket::TCP->decode($ip_obj->{data}); | 
| 143 | 0 |  |  |  |  |  | $this->propagate_fields('tcp', $tcp_obj, $record); | 
| 144 | 0 |  |  |  |  |  | $type = 'tcp'; | 
| 145 | 0 |  |  |  |  |  | $data = $tcp_obj->{'data'}; | 
| 146 |  |  |  |  |  |  |  | 
| 147 |  |  |  |  |  |  | $record->{'tcp'}->{'flags'} = $this->get_flag_list( | 
| 148 | 0 |  |  |  |  |  | $tcp_obj->{'flags'}, | 
| 149 |  |  |  |  |  |  | $TCP_FLAGS, | 
| 150 |  |  |  |  |  |  | ); | 
| 151 |  |  |  |  |  |  |  | 
| 152 | 0 |  |  |  |  |  | $this->attach_dns_info($record, $tcp_obj); | 
| 153 |  |  |  |  |  |  | } | 
| 154 |  |  |  |  |  |  | elsif ( $ip_obj->{'proto'} == IP_PROTO_UDP ) { | 
| 155 | 0 |  |  |  |  |  | my $udp_obj = NetPacket::UDP->decode ($ip_obj->{data}); | 
| 156 | 0 |  |  |  |  |  | $this->propagate_fields('udp', $udp_obj, $record); | 
| 157 | 0 |  |  |  |  |  | $type = 'udp'; | 
| 158 | 0 |  |  |  |  |  | $data = $udp_obj->{'data'}; | 
| 159 |  |  |  |  |  |  |  | 
| 160 | 0 |  |  |  |  |  | $this->attach_dns_info($record, $udp_obj); | 
| 161 |  |  |  |  |  |  | } | 
| 162 |  |  |  |  |  |  | } | 
| 163 |  |  |  |  |  |  | elsif ( $eth_obj->{'type'} == ETH_TYPE_ARP ) { | 
| 164 | 0 |  |  |  |  |  | $type = 'arp'; | 
| 165 | 0 |  |  |  |  |  | my $arp_obj = NetPacket::ARP->decode($eth_obj->{data}); | 
| 166 | 0 |  |  |  |  |  | $this->propagate_fields('arp', $arp_obj, $record, [qw(opcode)]); | 
| 167 |  |  |  |  |  |  |  | 
| 168 | 0 |  |  |  |  |  | my $opcode = $arp_obj->{'opcode'}; | 
| 169 | 0 |  |  |  |  |  | $record->{'arp'}->{'opcode'} = $ARP_OPCODES->{$opcode}; | 
| 170 |  |  |  |  |  |  | } | 
| 171 |  |  |  |  |  |  |  | 
| 172 | 0 |  |  |  |  |  | $record->{'type'} = $type; | 
| 173 | 0 | 0 |  |  |  |  | $record->{'data'} = $data if ( $this->{'DATA'} ); | 
| 174 |  |  |  |  |  |  |  | 
| 175 | 0 |  |  |  |  |  | return App::RecordStream::Record->new($record); | 
| 176 |  |  |  |  |  |  | } | 
| 177 |  |  |  |  |  |  |  | 
| 178 |  |  |  |  |  |  | sub attach_dns_info { | 
| 179 |  |  |  |  |  |  | my $this   = shift; | 
| 180 |  |  |  |  |  |  | my $record = shift; | 
| 181 |  |  |  |  |  |  | my $packet = shift; | 
| 182 |  |  |  |  |  |  |  | 
| 183 |  |  |  |  |  |  | # Assume DNS packets happen on port 53 | 
| 184 |  |  |  |  |  |  | unless ( $packet->{'dest_port'} == 53 || $packet->{'src_port'} == 53 ) { | 
| 185 |  |  |  |  |  |  | return; | 
| 186 |  |  |  |  |  |  | } | 
| 187 |  |  |  |  |  |  |  | 
| 188 |  |  |  |  |  |  | my $data = $packet->{'data'}; | 
| 189 |  |  |  |  |  |  | my $dns_packet = Net::DNS::Packet->new(\$data); | 
| 190 |  |  |  |  |  |  | my @answers = $dns_packet->answer(); | 
| 191 |  |  |  |  |  |  |  | 
| 192 |  |  |  |  |  |  | if ( ! $this->{'DATA'} ) { | 
| 193 |  |  |  |  |  |  | $dns_packet->{'buffer'} = ''; | 
| 194 |  |  |  |  |  |  | foreach my $answer (@answers) { | 
| 195 |  |  |  |  |  |  | $answer->{'rdata'} = ''; | 
| 196 |  |  |  |  |  |  | } | 
| 197 |  |  |  |  |  |  | } | 
| 198 |  |  |  |  |  |  |  | 
| 199 |  |  |  |  |  |  | $record->{'dns'}             = $dns_packet; | 
| 200 |  |  |  |  |  |  | $record->{'dns'}->{'answer'} = \@answers; | 
| 201 |  |  |  |  |  |  | } | 
| 202 |  |  |  |  |  |  |  | 
| 203 |  |  |  |  |  |  | sub get_flag_list { | 
| 204 |  |  |  |  |  |  | my $this       = shift; | 
| 205 |  |  |  |  |  |  | my $flags      = shift; | 
| 206 |  |  |  |  |  |  | my $flags_hash = shift; | 
| 207 |  |  |  |  |  |  |  | 
| 208 |  |  |  |  |  |  | my $to_return = {}; | 
| 209 |  |  |  |  |  |  | foreach my $name ( keys %$flags_hash ) { | 
| 210 |  |  |  |  |  |  | if ( $flags & $flags_hash->{$name} ) { | 
| 211 |  |  |  |  |  |  | $to_return->{$name} = 1; | 
| 212 |  |  |  |  |  |  | } | 
| 213 |  |  |  |  |  |  | } | 
| 214 |  |  |  |  |  |  |  | 
| 215 |  |  |  |  |  |  | return $to_return; | 
| 216 |  |  |  |  |  |  | } | 
| 217 |  |  |  |  |  |  |  | 
| 218 |  |  |  |  |  |  |  | 
| 219 |  |  |  |  |  |  | sub propagate_fields { | 
| 220 |  |  |  |  |  |  | my $this             = shift; | 
| 221 |  |  |  |  |  |  | my $dest_key         = shift; | 
| 222 |  |  |  |  |  |  | my $src              = shift; | 
| 223 |  |  |  |  |  |  | my $dest             = shift; | 
| 224 |  |  |  |  |  |  | my $extra_suppressed = shift; | 
| 225 |  |  |  |  |  |  |  | 
| 226 |  |  |  |  |  |  | my $suppressed = { map { $_ => 1 } @$DEFAULT_SUPPRESSED_FIELDS, @$extra_suppressed }; | 
| 227 |  |  |  |  |  |  |  | 
| 228 |  |  |  |  |  |  | foreach my $key (keys %$src) { | 
| 229 |  |  |  |  |  |  | next if ( $suppressed->{$key} ); | 
| 230 |  |  |  |  |  |  | $dest->{$dest_key}->{$key} = $src->{$key}; | 
| 231 |  |  |  |  |  |  | } | 
| 232 |  |  |  |  |  |  | } | 
| 233 |  |  |  |  |  |  |  | 
| 234 |  |  |  |  |  |  | sub usage { | 
| 235 |  |  |  |  |  |  | my $this = shift; | 
| 236 |  |  |  |  |  |  |  | 
| 237 |  |  |  |  |  |  | my $options = [ | 
| 238 |  |  |  |  |  |  | [ 'data', 'Include raw data bytes of deepest packet level'], | 
| 239 |  |  |  |  |  |  | ]; | 
| 240 |  |  |  |  |  |  |  | 
| 241 |  |  |  |  |  |  | my $args_string = $this->options_string($options); | 
| 242 |  |  |  |  |  |  |  | 
| 243 |  |  |  |  |  |  | my $ip_flag_names  = join(', ', sort keys %$IP_FLAGS); | 
| 244 |  |  |  |  |  |  | my $tcp_flag_names = join(', ', sort keys %$TCP_FLAGS); | 
| 245 |  |  |  |  |  |  | my $arp_opcodes    = join(', ', sort values %$ARP_OPCODES); | 
| 246 |  |  |  |  |  |  |  | 
| 247 |  |  |  |  |  |  | return < | 
| 248 |  |  |  |  |  |  | Usage: recs-fromtcpdump   ... | 
| 249 |  |  |  |  |  |  | __FORMAT_TEXT__ | 
| 250 |  |  |  |  |  |  | Runs tcpdump and puts out records, one for each packet.  Expects pcap | 
| 251 |  |  |  |  |  |  | files.  Will put the name of the originating capture file in the 'file' | 
| 252 |  |  |  |  |  |  | field. | 
| 253 |  |  |  |  |  |  |  | 
| 254 |  |  |  |  |  |  | Will parse packet types: ethernet, ip, udp, arp, tcp | 
| 255 |  |  |  |  |  |  | The type key will indicate the highest level parsed.  DNS information will | 
| 256 |  |  |  |  |  |  | be parsed for TCP or UDP packets that are from or to port 53. The parsed | 
| 257 |  |  |  |  |  |  | representation of the packet for each valid level will be placed in the | 
| 258 |  |  |  |  |  |  | corresponding key.  For instance, for a tcp packet, there will be | 
| 259 |  |  |  |  |  |  | information in the keys 'ethernet', 'ip', and 'tcp' | 
| 260 |  |  |  |  |  |  |  | 
| 261 |  |  |  |  |  |  | By default, data output is suppressed due to poor interaction with terminal | 
| 262 |  |  |  |  |  |  | programs. | 
| 263 |  |  |  |  |  |  | __FORMAT_TEXT__ | 
| 264 |  |  |  |  |  |  |  | 
| 265 |  |  |  |  |  |  | Flags will be parsed into hash of strings | 
| 266 |  |  |  |  |  |  | Possible IP flags: $ip_flag_names | 
| 267 |  |  |  |  |  |  | Poassible TCP flags: $tcp_flag_names | 
| 268 |  |  |  |  |  |  |  | 
| 269 |  |  |  |  |  |  | ARP opcodes will be matched | 
| 270 |  |  |  |  |  |  | Possible opcodes: $arp_opcodes | 
| 271 |  |  |  |  |  |  |  | 
| 272 |  |  |  |  |  |  | Creating a pcap file: | 
| 273 |  |  |  |  |  |  | __FORMAT_TEXT__ | 
| 274 |  |  |  |  |  |  | Run a tcpdump command with -w FILE to produce a pcap file.  For instance: | 
| 275 |  |  |  |  |  |  | sudo tcpdump -w /var/tmp/capture.pcap | 
| 276 |  |  |  |  |  |  |  | 
| 277 |  |  |  |  |  |  | Optionally, include all the data and timing information: | 
| 278 |  |  |  |  |  |  | sudo tcpdump -w capture.pcap -s4096 -S -tt | 
| 279 |  |  |  |  |  |  |  | 
| 280 |  |  |  |  |  |  | See 'man tcpdump' for more information. | 
| 281 |  |  |  |  |  |  | __FORMAT_TEXT__ | 
| 282 |  |  |  |  |  |  |  | 
| 283 |  |  |  |  |  |  | Arguments | 
| 284 |  |  |  |  |  |  | $args_string | 
| 285 |  |  |  |  |  |  |  | 
| 286 |  |  |  |  |  |  | Examples | 
| 287 |  |  |  |  |  |  | Get records for all packets | 
| 288 |  |  |  |  |  |  | recs-fromtcpdump  capture.pcap | 
| 289 |  |  |  |  |  |  | USAGE | 
| 290 |  |  |  |  |  |  | } | 
| 291 |  |  |  |  |  |  |  | 
| 292 |  |  |  |  |  |  | 1; |